• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

BTEC National in IT Organisational systems security - Software and network security (P3,M2,D1)

Extracts from this document...


1. Software and network security Handshaking: This is the process in which when a computer tries to establish a connection with another computer or device defines the rules for communication. Handshaking makes it possible for two computers or devices to connect without the need of human intervention to set parameters or rules of communication. Handshaking is the steps or verifying the connection, speed or authorization of the computer or device trying to connect to it. Diskless networks: This is where the computer at the workstation doesn?t have any form of data storage and depends on another computer such as a server to load its operating system and to access data over a network connection. This is useful as it is easy to transfer data from a computer to a mobile storage device and removes the vulnerability of PC?s in the workstation. This can also be done over the ?cloud? using applications that emulate the behaviour of your computer system. Use of backups: This is where data is copied to another storage device to ensure the data is safe and secure should system failures occur. ...read more.


This is done by the use of a tunnel which is an agreed route for encrypted traffic. This creates a trusted connection on a system which is not trusted. This helps prevent packet sniffing and fraudulent authentication. Intrusion detection systems: This monitors network activity for someone trying to break in or compromise a system. Some of these systems are passive and will record any suspicious activity for the network administrator and others are reactive which will try to reconfigure the firewall automatically to block the intrusion. Passwords: This is a word that must be entered to allow access to the system which is chosen by the user. Many organisations have password policies, for example, not to write down the password, change the password every month or so or to choose a password which is not contained within a dictionary. Many systems will lock a user out after 3 password attempt, then the user must go to the network administrator and provide suitable proof of identity and either remind the user of the password or create a new one. ...read more.


If the data or information has been backed up in an external media device in a safe place such as on an optical disc or on paper then the required data/information only needs to be retrieved from its safe location and the data/information is recovered, this reduces the downtime resulting from the disaster. Another form of disaster recovery is the use of a system backup, which is a mirror image of the computer systems used by the business; this means if there is a failure with one or all of the systems then the backup system can be put in place to prevent downtime caused by the failure. If damage occurs to the hardware of the system then spare parts that are kept in case of hardware failure are a good idea, however this is not very cost effective. Alternatively, in the case of a fire or flood and an entire system has been made unusable then a whole system replacement may be required, this may be stored as a backup in a safe place or bought in reaction to the disaster, this is the least effective way to prevent downtime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    Human Errors: is when someone makes a mistake which results in data being lost. Incidents such as people accidentally deleting files and pulling plugs and such. 5. Theft: Theft occurs when criminals gain access to an office building or other work environment and physically steal hardware and other entities

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    Databases within Rufus are used to store all the data which is described by the data model usually on a disk. Access is usually very quick and frequently used. A database is a structured way of collecting records and data, this Is stored on a computer system.The structure is achieved

  1. Peer reviewed

    Organisational system security - The possible security issues which exist within the FilmPoster.com system

    3 star(s)

    posters, asking them to dial a number in regards to their details such as bank accounts and once the number has been dialled, the customer is told to enter their account details and PIN's. Phishing is mainly carried out using email or instant messaging directing users to enter their details

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Similar to the CDMA/CD if the channel is busy then it will stop for a random amount of time and then retransmit which reduces the possibility of another collision. CSMA/CA will send a requesting signal which needs to be acknowledged by other nodes before transmission takes place.

  1. Computer systems assignment 1

    Task 2 Purpose features and functions of two operating systems Windows XP- It's an operating system which was created by Microsoft in 2001 and was a great success. This operating system is made for ordinary people performing basic tasks but is capable of much more.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    A dating agency may collect and process data for the purpose of matching compatible people. They cannot then use that data to identify prospective punters for a sideline in cosmetic surgery, unless they notify the data subjects or the Commissioner of their intention.

  1. Hardware and Software

    Xara Xtreme is a fast yet powerful vector-based drawing and illustration program for Windows. 2. Includes a Picture Editor where you can crop, rotate, enhance and sharpen bitmap-based photos. 3. Suitable for Web graphics, illustration, technical drawing, animation, cartooning, and compositions.

  2. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    Your security procedure should include things such as; never turn off your firewall, don't share you password, don't leave your PC unattended and logged in. Scheduling of security audits: A security audit is a technical assessment of how secure something is, be it physical, hardware, software or data security.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work